Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged Live

Rss Feed Group items tagged

yeniutami888

Agen Judi Sbobet Casino Via Pulsa | AgenCasino88.Co - 0 views

  •  
    Agen Judi Sbobet Casino Via Pulsa, Bandar Judi Sbobet Via Pulsa, Agen Judi Deposit Termurah, Agen Judi Sbobet Via Pulsa, Bandar Sbobet Deposit OVO, Live Chat Golcash, Daftar Judi Deposit Termurah, Situs Judi Sbobet
yeniutami888

Situs Judi Sbobet Casino Deposit Termurah | AgenCasino88.Co - 0 views

  •  
    Situs Judi Sbobet Casino Deposit Termurah, Agen Judi Deposit Termurah, Daftar Sbobet Casino Via Ovo, Bandar Judi Sbobet, Live Casino Via Pulsa, Judi Casino Sbobet Via Pulsa, Daftar Judi Deposit Termurah, Situs Judi Sbobet
Rof Harris

Meet Your Ends With The Easy Assistance Of Same Day Short Term Loans! - 0 views

  •  
    Experiencing difficulty in covering your monthly livings as well as sudden expenses within a single source of income?....
Devia Rajput

About Simpsons Top 10 Wonderful Data - 0 views

  •  
    Now You See Top 10 Wonderful Data About Simpsons.This family cartoon has been started from last 23 seasons. They are very funny. Now we can't live to see "The Simpsons". "Simpsons" orientation and quotation marks have become a part of our daily language. Many types of events happened in the background of the fantastic show.
Anne Bubnic

Quest Atlantis - 3 views

  •  
    Quest Atlantis (QA) is an international learning and teaching project that uses a 3D multi-user environment to immerse children, ages 9-16, in educational tasks. Participation in this game is designed to enhance the lives of children while helping them grow into knowledgeable, responsible, and empathetic adults.
Anne Bubnic

Josh Gunderson CyberBullying PSA [Video] - 5 views

  •  
    Cyber Bullying has gained national attention in the case of Phoebe Prince, an irish immigrant attending South Hadley High School in Massachusetts. Though this case has shed new light on the issues of cyber bullying, there are many cases of what has been dubbed "bullycide" where students bullied both on and off line have taken their lives. Regardless of where the bullying is taking place, it is still an issue that must be dealt with on every level in order to prevent further tragedies.
Anne Bubnic

Picture Your Name Here [Facebook] - 0 views

  • Campaigns to educate students about the pitfalls of Facebook — how professors, parents and prospective employers can use the social networking site to uncover information once considered private — have become a staple of freshman orientation sessions and career center clinics. Students are apparently listening.
  • If I’m holding something I shouldn’t be holding, I’ll untag,” says Robyn Backer, a junior at Virginia Wesleyan College. She recalls how her high school principal saw online photos of partying students and suspended the athletes who were holding beer bottles but not those with red plastic cups. “And if I’m making a particularly ugly face, I’ll untag myself. Anything really embarrassing, I’ll untag.”
  •  
    Teens and college students living the party life have discovered they may have a little too much information up on their web site. De-tagging - removing your name from a Facebook photo - has become an image-saving step in the college party cycle. "The event happens, pictures are up within 12 hours, and within another 12 hours people are de-tagging," says Chris Pund, a senior at Radford University in Virginia.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Anne Bubnic

Cyberbullying - Bullying Beyond the Schoolyard [New Book] - 0 views

  •  
    Teens and tweens have been bullying each other for generations. The bullies of today, however, have the advantage of utilizing technology such as computers, cell phones and other electronic devices to inflict harm on others. "Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbullying," due out this month, uncovers the types of youth most susceptible, how they felt, who they told, how they coped and how it affected their lives, and illustrates the gravity of cyberbullying and its real-world repercussions. The co-authors, [Justin Patchin, Ph.D. and Sameer Hinduja] both have backgrounds in Criminal Justice and are university-based. Their web site, Cyberbullying.Us is dedicated to identifying the causes and consequences of online harrassment.
Anne Bubnic

So Your Child Is a Cyber-Bully! - 0 views

  •  
    Most of us following the news know that cyber-bullying is on the rise, and that it has even led to at least one child suicide. Up to now, though, response has focused on strategies to help the victims. What if you discover that you're living with a cyber-bully?
Anne Bubnic

Should schools teach Facebook? - 0 views

  •  
    FACEBOOK, MySpace, YouTube and Wikipedia are considered valuable educational tools by some who embrace the learning potential of the internet; they are also seen as a massive distraction with no academic benefit by others. Research in Nottingham and Notts suggests split opinions over the internet in the classroom. Some 1,500 interviews with teachers, parents and students nationwide showed the 'net was an integral part of children's personal lives, with 57% of 13 to 18-year-olds in Notts using blogs in their spare time and 58% in Nottingham. More than 60% of Nottingham teens use social networking sites. They are a big feature of leisure time - but now the science version of You Tube, developed by academics at The University of Nottingham, has been honoured in the US this week. The showcase of science videos shares the work of engineers and students online. However just a quarter of teachers use social networking tools in the classroom and their teaching, preferring to leave children to investigate outside school.
Anne Bubnic

Plight of Marin 'bullying' victim inspires book - 0 views

  •  
    An impulse to help a Marin girl who had been bullied by her classmates has transformed the lives of two Mill Valley sisters and led to a paperback book being sold nationwide. Two years ago, sisters Emily, 18, and Sarah Buder, 15, read a newspaper story about the plight of Olivia Gardner, a then 13-year-old Novato girl who had been ridiculed by her classmates and subjected to an "Olivia Haters" Web site that drove her to change schools three times and eventually to drop out of school altogether.
Anne Bubnic

Microsoft parent's guide to online safety: Ages and stages - 0 views

  •  
    Whether your kids are Internet beginners or are already Web savvy, you can help to guide their use of the Internet as they grow through different ages and stages in their lives. Child safety information and recommendations for ages 2-17.
Anne Bubnic

The Road to Cybersafety - 0 views

  • Carrill is part of the Platte County Sheriff’s Office. He also leads the Western Missouri Cyber Crimes Task Force. One of his primary missions is to track down and arrest online predators who trade in child pornography.And all these cameras only make his job more challenging. About 40 percent of the nation’s minors have access to Webcams, Carrill explained, devices for uploading live video to the Internet. About 65 percent of all children have access to cell phone cameras.
  • erhaps the biggest issue is that fact that kids don’t understand that when a picture is posted online, it’s nearly impossible to remove.“Once that image is taken, it’s out there forever,” Shehan said. “The No. 1 issue that we’ve seen with Webcams is teenagers self-producing pornography.”
  • All we can tell them is, ‘I’m sorry,’” Carrill said. “The minute the camera clicks, you no longer own that image. It has the potential to harm that person years from now.”A Webcam placed in a child’s bedroom is another bad combination, according to Shehan and Carrill. Sexual predators search for kids who use Webcams in the privacy of their own rooms, then lure or blackmail the child into providing pictures of themselves.“We see cases time after time of children who take pictures, send them to a predator and get a pornographic collage back that the predator uses to blackmail the child into providing more images,” Shehan said.
  • ...3 more annotations...
  • . About 40 percent of the nation’s minors have access to Webcams, Carrill explained, devices for uploading live video to the Internet. About 65 percent of all children have access to cell phone cameras.Carrill’s team recently started a new operation to search image-trading Web sites for known child pornography in Missouri. The results were frightening, he said. More than 6,000 images were found in the state; about 700 of those pictures were downloaded in the Kansas City area.Between sexual predators who fish for images and immature decisions by kids with cameras, more children are either having their images posted online or being exposed to pornography, according to a 2006 report by the National Center for Missing and Exploited Children.
  • In the end, the best tool to defeat child pornography is parent education, according to both Shehan and Carrill. More than anything, kids need to know they can trust their parents.“It’s through that open line of communication between the parent and child that they can work through or prevent bad situations,” Carrill said.
  • All parents should follow a few basic rules when it comes to cyber safety, according to experts:- Keep computers in common areas of the home.- Monitor Internet use by children.- Enable privacy protection software.- Turn Webcams off or protect them with a password.- Track what images are being uploaded by children in the household.- Talk to children about what is appropriate.
  •  
    Webcams, cell phone cameras being put to troubling use, experts say. People are taking pictures, lots of them, and then uploading them as permanent displays in the Internet collection.
Anne Bubnic

How I Learned to Type - 0 views

  •  
    "How I Learned to Type," was created by Diana Kimball and Sarah Zhang of the Digital Natives team. It takes a glance into how people of different ages learned one of the first skills every digital inhabitant needs - typing. Do you "peck" with two fingers, type in multiple languages at once, or have a typing teacher with a wooden leg? The people in "How I Learned to Type" do all this and more. Digital technology has become so ingrained in our lives that for digital natives, learning to type has become a ubiquitous experience, as memorable, say, as learning to read or ride a bike.
Anne Bubnic

Facebook Killed the Private Life - 0 views

  •  
    NYU professor and social networking expert Clay Shirky talks about where to draw the line between personal and public life online.
    You live your life online -- and anyone can read it. Should employers be able to troll your Facebook or MySpace page? Or should everything that you put online be accessible to anyone, anywhere? With increasingly popular social networking sites aggregating unprecedented volumes of personal data, the age-old issue of online privacy is once again rearing its ugly head.
Anne Bubnic

I Know What You Did 5 Minutes Ago (It Came Through My Facebook Feed) - 0 views

  •  
    Live feeds from social networking sites make it easy to monitor the actions of friends. But how much information constitutes "too much information" is a conversation that needs to take place with teens. Not everything is as private as it may seem.
Judy Echeandia

Cyberstalkers -- Today's Wild West Villains - 0 views

  • Education is the key. Teach children safe practices for online use. Help them learn to spot the dangerous alleyways of that Internet boomtown. They need to learn who the law is, and who the desperados are.
  •  
    Do kids really know who they are communicating with online? Posting too much personal information online makes it easy for internet users, posing as friends, to gather details about personal lives that could be used in unintended ways.
Anne Bubnic

How teens use social network sites: Clear insights - 0 views

  •  
    Anne Collier provides us with thoughtful analysis and commentary on the MacArthur Foundation's recent symposium [April 2008) at Stanford, "From MySpace to Hip Hop: New Media In the Everyday Lives of Youth." Click here for the entire Digital Youth presentation.
Anne Bubnic

Is Your Tween Safe Online? - 0 views

  •  
    John Walsh, children's advocate and host of America's Most Wanted, will discuss what parents and guardians can do to help protect and educate their children about the potential dangers of online predators and offer tips for safer surfing. Live Webcast. Wednesday, July 23, 2008 1:00 PM Eastern
‹ Previous 21 - 40 of 139 Next › Last »
Showing 20 items per page